1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
9

You are trying to determine why a packet of data is not being correctly sent over the internet. You determine that the problem i

s that they are being labeled with the incorrect IP address. Which layer of the protocol stack is the most likely problem?
IP

application

TCP

hardware
Computers and Technology
2 answers:
spayn [35]3 years ago
6 0
Answer is A it has a false ip so that is why an error is happening therefore the answer would be A.
Mice21 [21]3 years ago
5 0
It is A because it is a false up acres
You might be interested in
Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
timurjin [86]

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

6 0
3 years ago
What is the purpose of including comments in code?
vova2212 [387]

Answer:

To help keep your code organised/understandable by other people.

Explanation:

One of the worse things if you are looking back at your code in the future is not being able to know what your code sections are for right away. You will want to make sure you explain what each section of code does for your own personal help. I'm not saying its required to do, you should probably do it to help yourself or other people who are going to read/collaborate on your code.

3 0
3 years ago
Monochrome refers to the use of one color in various shades and tints
masya89 [10]
Your answer is gonna be true
5 0
3 years ago
Does Android have text-to-voice?
Licemer1 [7]
Yes but its nothing compared to apple
6 0
4 years ago
What allows customers to use the Web to find answers to their questions or solutions to their problems?
scoundrel [369]

Answer:

b..........please Don't hate if wrong

3 0
3 years ago
Read 2 more answers
Other questions:
  • When you buy a trackphone, do you have to pay a monthly wage or do you just need to buy the minutes and that's all?
    13·2 answers
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • Why are file naming conventions essential
    13·2 answers
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • Type two statements.
    11·1 answer
  • CC stand for.....in the email platform?
    12·2 answers
  • How much do high-end earners make as power plant operators? Type answer as numerical number.
    14·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • You want to substitute one word with another throughout your
    13·1 answer
  • Who does online school on FLVS???????????????????
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!